
Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux
★ 4 (7) · Beginner · Course · 1 - 3 Months

Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Network Security, Cyber Threat Hunting, Cyber Security Strategy, Threat Detection, Cybersecurity, Threat Management, Cyber Security Assessment, Operating System Administration, IT Security Architecture, Cyber Attacks, Intrusion Detection and Prevention, Cyber Engineering, Malware Protection, Vulnerability Management, Vulnerability Assessments, Incident Response, Network Monitoring, Incident Management
Beginner · Course · 1 - 4 Weeks

Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, IT Security Architecture, Firewall, Computer Security, AI Security, Cyber Threat Intelligence, Endpoint Security, Endpoint Detection and Response, Security Architecture Review, Exploitation techniques, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications
★ 4.6 (558) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cybersecurity, Cyber Security Assessment, Anomaly Detection, Cyber Attacks, Threat Detection, AI Security, Security Awareness, Network Analysis, Generative AI, Prompt Engineering, Email Security, Unsupervised Learning, Applied Machine Learning
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Detection and Response, Incident Management, Endpoint Security, Network Security, Firewall, Security Software, Anomaly Detection, System Monitoring
★ 4.7 (459) · Beginner · Course · 1 - 3 Months

New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Cyber Security Assessment, Information Systems Security, Network Security, Computer Security, Exploitation techniques, Risk Management Framework, Cryptography, Data Integrity
★ 4.7 (2.9K) · Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Computer Security Incident Management, Incident Management, Incident Response, Security Management, Threat Management, Security Strategy, Event Monitoring, Security Information and Event Management (SIEM), Enterprise Security, IT Automation, Automation, Systems Integration
★ 4.9 (9) · Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Exploit development, Application Security, Security Testing, Exploitation techniques, Vulnerability Scanning, Security Awareness, Vulnerability Assessments, Human Factors (Security), Hardening
Intermediate · Course · 1 - 3 Months
Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, Hardening, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Human Factors (Security), Event Monitoring, Anomaly Detection, System Monitoring, Authentications, Virtual Machines
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Security Assessment, Cybersecurity, Operating System Administration, Operating Systems, Hardening, Computer Security, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Identity and Access Management, Memory Management, Data Persistence, Computer Architecture
★ 4.1 (9) · Intermediate · Course · 1 - 3 Months

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Computer Security Incident Management, Vulnerability Management, Exploitation techniques
★ 4.9 (8) · Beginner · Course · 1 - 4 Weeks